Home | Amazing | Today | Tags | Publishers | Years | Search 
Inside Microsoft SharePoint 2013 (Developer Reference)
Inside Microsoft SharePoint 2013 (Developer Reference)

Build custom SharePoint solutions with architectural insights from the experts.

Take a deep dive into SharePoint 2013, and master the intricacies for designing and implementing robust apps and other business solutions for your organization. Led by an author team with in-depth knowledge of SharePoint architecture,...

Microsoft DirectAccess Best Practices and Troubleshooting
Microsoft DirectAccess Best Practices and Troubleshooting

Secure and efficient functioning of your DirectAccess environment

Overview

  • Learn how to make Manage Out work for your DirectAccess clients without compromising your network
  • Learn how to understand enormous logfiles along with common troubleshooting criteria
  • Explore some...
iOS 7 Game Development
iOS 7 Game Development

Develop powerful, engaging games with readytouse utilities from Sprite Kit

About This Book

  • Pen your own endless runner game using Apple's new Sprite Kit framework
  • Enhance your user experience with easy-to-use animations and particle effects using Xcode 5
  • Utilize...
FreeSWITCH 1.6 Cookbook
FreeSWITCH 1.6 Cookbook

Over 45 practical recipes to empower you with the latest FreeSWITCH 1.6 features

About This Book

  • Learn how to create a fast and secure messaging and telephony system with FreeSWITCH
  • Trap all the common functionalities of the telephony platform using popular communication protocols
  • ...
Starling Game Development Essentials
Starling Game Development Essentials

Develop and deploy isometric turn-based games using Starling

Overview

  • Create a cross-platform Starling Isometric game
  • Add enemy AI and multiplayer capability
  • Explore the complete source code for the Web and cross-platform game develpment

In...

Blackhatonomics: An Inside Look at the Economics of Cybercrime
Blackhatonomics: An Inside Look at the Economics of Cybercrime

Would you be surprised if I say that the essence of cyber-crime comes down to traditional theft of property—be that of funds in accounts, of company data (and the financial harm that can cause), or of personal/confidential information (and the damage that can cause by it winding up in the wrong hands)? As time goes by, hackers, virus...

Pro ASP.NET Web API Security: Securing ASP.NET Web API
Pro ASP.NET Web API Security: Securing ASP.NET Web API

ASP.NET Web API is a key part of ASP.NET MVC 4 and the platform of choice for building RESTful services that can be accessed by a wide range of devices. Everything from JavaScript libraries to RIA plugins, RFID readers to smart phones can consume your services using platform-agnostic HTTP.

With such wide accessibility,
...

Implementing SSL / TLS Using Cryptography and PKI
Implementing SSL / TLS Using Cryptography and PKI

Hands-on, practical guide to implementing SSL and TLS protocols for Internet security

If you are a network professional who knows C programming, this practical book is for you.  Focused on how to implement Secure Socket Layer (SSL) and Transport Layer Security (TLS), this book guides you through all necessary steps, whether or...

Burdens of Proof: Cryptographic Culture and Evidence Law in the Age of Electronic Documents
Burdens of Proof: Cryptographic Culture and Evidence Law in the Age of Electronic Documents

The gradual disappearance of paper and its familiar evidential qualities affects almost every dimension of contemporary life. From health records to ballots, almost all documents are now digitized at some point of their life cycle, easily copied, altered, and distributed. In Burdens of Proof, Jean-François Blanchette examines...

VMware View Security Essentials
VMware View Security Essentials

Most people associate security with network security and focus on firewalls and network monitoring. However, there is more to security than that. Security starts with the establishment of a stable environment, protecting this environment not only from intrusion, but also from malicious intent. It is about tracking the issue and recovering...

Microsoft System Center 2012 Orchestrator Cookbook
Microsoft System Center 2012 Orchestrator Cookbook

Automate mission-critical tasks with this practical, real-world guide to System Center 2012 Orchestrator

Overview

  • Create powerful runbooks for the entire System Center 2012 product line
  • Master System Center 2012 to create advanced runbooks
  • Learn how to install System Center...
Java Security (Java Series)
Java Security (Java Series)

Java's most striking claim is that it provides a secure programming environment. However, despite lots of discussion, few people understand precisely what Java's claims mean and how it backs up those claims. Java Security is an in-depth exploration aimed at developers, network administrators, and anyone who needs to work with...

Result Page: 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy